A comprehensive review of cyber security vulnerabilities, threats, attacks, and solutions

Ö Aslan, SS Aktuğ, M Ozkan-Okay, AA Yilmaz, E Akin - Electronics, 2023 - mdpi.com
Internet usage has grown exponentially, with individuals and companies performing multiple
daily transactions in cyberspace rather than in the real world. The coronavirus (COVID-19) …

Review of recent detection methods for HTTP DDoS attack

GA Jaafar, SM Abdullah, S Ismail - Journal of Computer …, 2019 - Wiley Online Library
With increment in dependency on web technology, a commensurate increase has been
noted in destructive attempts to disrupt the essential web technologies, hence leading to …

DLDM: Deep learning-based defense mechanism for denial of service attacks in wireless sensor networks

M Premkumar, TVP Sundararajan - Microprocessors and Microsystems, 2020 - Elsevier
Abstract Wireless Sensor Networks (WSNs) include small battery-based self-governing
devices that are deployed in a distributed manner to supervise the environmental or physical …

Application layer denial-of-service attacks and defense mechanisms: a survey

N Tripathi, N Hubballi - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
Application layer Denial-of-Service (DoS) attacks are generated by exploiting vulnerabilities
of the protocol implementation or its design. Unlike volumetric DoS attacks, these are …

A survey for user behavior analysis based on machine learning techniques: current models and applications

A G. Martín, A Fernández-Isabel, I Martín de Diego… - Applied …, 2021 - Springer
Significant research has been carried out in the field of User Behavior Analysis, focused on
understanding, modeling and predicting past, present and future behaviors of users …

[HTML][HTML] Bot recognition in a Web store: An approach based on unsupervised learning

S Rovetta, G Suchacka, F Masulli - Journal of Network and Computer …, 2020 - Elsevier
Web traffic on e-business sites is increasingly dominated by artificial agents (Web bots)
which pose a threat to the website security, privacy, and performance. To develop efficient …

A comprehensive survey on low-rate and high-rate DDoS defense approaches in SDN: taxonomy, research challenges, and opportunities

S Karnani, N Agrawal, R Kumar - Multimedia Tools and Applications, 2024 - Springer
Abstract Software Defined Networking (SDN) expands the networking capabilities using
abstraction, open-source protocols, energy efficiency, and programmable features for …

Endogenous security defense against deductive attack: When artificial intelligence meets active defense for online service

Z Zhou, X Kuang, L Sun, L Zhong… - IEEE Communications …, 2020 - ieeexplore.ieee.org
Existing static defenses for online service systems can be fragile and costly due to the
continuity of ubiquitous cyber attacks. LAD has become a promising technology to tackle this …

IoTTPS: Ensemble RKSVM Model-Based Internet of Things Threat Protection System

U Akram, W Sharif, M Shahroz, MF Mushtaq, DG Aray… - Sensors, 2023 - mdpi.com
An Internet of Things (IoT) network is prone to many ways of threatening individuals. IoT
sensors are lightweight, lack complicated security protocols, and face threats to privacy and …

Rad: A statistical mechanism based on behavioral analysis for ddos attack countermeasure

M Hajimaghsoodi, R Jalili - IEEE Transactions on Information …, 2022 - ieeexplore.ieee.org
Nowadays, Distributed Denial of Service (DDoS) attacks are among the most prevailing and
costly attacks across the networks which challenge a variety of services. While many …